Module 4
Module 4
645. In order to protect its critical data from virus attacks an organisation
decides to limit internet access to its employees. What type of risk
response has the organisation exercised?
A. Mitigate
B. Avoid
C. Accept
D. Transfer
646. A production company decides to insure against production loss due to
natural calamities. What type of response is this classified as?
A. Mitigate
B. Accept
C. Transfer
D. Avoid
647. Implementation of Information system control in an organisation
ensures that:
A. Risk is transferred to another entity
B. Desired Outcome from business process is not affected
C. Losses are avoided
D. Incidents due to risk materialisation are avoided
648. Which of the following leads to destruction of information Assets such
as hardware, software and critical data?
A. Data error during data entry
B. Non maintenance of privacy with respect to sensitive data
C. Unauthorised access to computer systems
D. Using systems that do not meet user requirements
649. Maintenance of privacy in relation to data collected by an organisation
is very important because:
A. Errors committed during entry would cause great damage
B. It has an impact on the infrastructure and business competitiveness
C. It can be easily accessed by third parties
D. It contains critical and sensitive information pertaining to a customer
650. The role of an internal auditor in Information Systems auditing
includes: A. Safeguarding data integrity
B. Attesting management objectives
C. Attesting System effectiveness and system efficiency objectives
D. Implementing control procedures
651. What does an external Information Systems auditor focus on?
A. Attesting objectives that focus on asset safeguarding and data
integrity
B. Attesting system effectiveness
C. Attesting system efficiency
D. Implementing control procedures
652. By auditing the characteristics of the system to meet substantial user
requirements, which control objective does an IS Auditor attest?
A. Data integrity objectives
B. System Effectiveness Objectives
C. Asset safeguarding objectives
D. System efficiency objectives
653. A statement of purpose achieved by implementing control procedures
in a particular IT process is defined as:
A. IS Control framework
B. Internal Controls
C. Control Objective
258
Protection of Information Assets
D. Preventive Controls
654. Which of the following is an example of technical implementation of
Internal Control?
A. Outlining policies that safeguard information assets
B. Installing a security guard in the premises to restrict entry of
unauthorised persons
C. Locking the room containing sensitive documents
D. Investing in tools and software to restrict unauthorised access to
information
655. What are preventive controls?
A. those mechanisms which refer unlawful activities to the
appropriate person/group B. those controls which attempt to predict
potential problems before they occur
C. those mechanisms which modify the processing system to minimise
error occurrences
D. those controls which corrects the error arising from a problem
656. What are detective controls?
A. Provision for control of probable threats from materializing
B. Those controls that are designed to detect errors and omissions of
malicious acts
C. Those controls which assess probable threats
D. Those controls which minimise the impact of threat
657. What are corrective controls?
A. Those controls that correct an error once it has been detected
B. Those mechanisms which provide a clear understanding of the
vulnerabilities of an asset
C. Surprise checks by an administrator
D. Those mechanisms by which the management gets regular reports of
spend to date against a profiled spend
658. An organisation decides to control the access to a software application
by segregating entry level and updation level duties. What type of
internal control does this amount to?
A. Preventive Control
B. Detective Control
C. Corrective Control
D. physical implementation of a control
659. Under which type of control mechanism does taking a back up of
everyday activity classify as?
A. Detective Control
B. Preventive control
C. Corrective control
D. Administrative Implementation of Control
660. As an IS auditor, how would you rate a computerised detective control
which is moderately efficient and with corresponding corrective
action?
A. High
B. Low
C. Moderate
D. Blank
661. As an IS auditor, how would you rate a least effective and inefficient
manual detective control without corrective action?
A. High
B. Low
C. Blank
D. Moderate
662. Which of the following describes the role of a risk owner?
A. Ensuring that all control objectives that focus on asset safeguarding
and data integrity are attested
260
Protection of Information Assets
262
Protection of Information Assets
B. Low
C. Moderate
D. High
671. The HR department of a company pays its employees medical claims
subject to a maximum limit per employee per year. For this, it relies on
data partaining to a full year downloaded through the appropriate
software. However, it does not have a proper back up or restoration
procedure in place. How will an IS auditor rate this?
A. High control
B. Low Control
C. Blank Control
D. Moderate Control
672. A data centre handling outsourced operations decides to set up a
parallel facility for its critical activities at some place other than its
present place of operations. This is done with an intention to facilitate
return of business to normal levels in case of impact of natural
disasters or unforeseen events. Under what security policy is this
categorised?
A. Business Continuity Management Policy
B. Acceptable use of Information Assets policy
C. Physical Access and Security Policy
D. Asset Management Policy
673. What are the three KEY objectives of Information Security Management
(CIA Triad)?
A. Compliance, Integrity and Availability
B. Confidentiality, Information Security and Availability
C. Confidentiality, Integrity and Availability
D. Confidentiality, Integrity and Asset Management
674. What does “Integrity” mean with respect to Information Security
Management?
A. No data/information or programs shall be allowed to be modified by
anyone without proper authority.
B. No data or information is made available to any person within or
outside the organization, other than the persons who are authorized to
use that data.
C. All Information Systems including hardware, communication networks,
software applications and the data they hold, is available to authorized
users to carry out business activities.
D. Executive management endorsement of intrinsic security
requirements to ensure that security expectations are met at all levels
of the enterprise
675. What provides the basis for ensuring that information security
expectations are met at all levels of an enterprise?
A. Adopting an internationally recognized reference framework to
establish an Information Security framework
B. Successful establishment and endorsement of intrinsic security
measures by the senior management
C. Prioritising expenditures to mitigate risks and avoid spending more
resources in assessing risks
D. Ensuring that the framework followed to implement, maintain, monitor
and improve Information Security is consistent with the organisational
culture.
676. How does an enterprise ensure that the information present in any of its
business processes is protected and secure?
A. By ensuring that the framework followed to implement, maintain,
monitor and improve Information Security is consistent with the
organisational culture.
B. By adopting an internationally recognized reference framework to
establish an Information Security framework
C. By spending resources widely and transparently
D. By establishing and enforcing an Information Security Program
677. How does an enterprise demonstrate to staff, customers and trading
partners that their data is safe?
A. By establishing and enforcing an Information Security Program
264
Protection of Information Assets
683. What should be done to ensure that security policies are in tune with
the management’s intent?
A. Change passwords regularly
B. Restrict unauthorised access to facilities
C. Review the security policies periodically
D. Hold non public personal information in strict confidence
684. Policies are generic and sometimes cannot be enforced in specific
situations. Can there be a relaxation of adherence to policy in such
cases?
A. Yes. But, it is necessary to ensure that there are suitable
compensating controls
B. Yes. Policies can be relaxed in case of such situations unconditionally
C. No. Under no circumstances can an Information Security policy be
relaxed
D. Yes. Adherence to the policy can be relaxed for an indefinite period
for the specific activity only.
685. Standards, Guidelines and Procedures are the three elements of policy
implementation. In what order should they be followed for proper
implementation?
A. Guidelines, Procedures and Standards
B. Procedures, Standards and Guidelines
C. Standards, Guidelines and Procedures
266
Protection of Information Assets
268
Protection of Information Assets
B. Process Owner
C. Information Custodian
D. System Administrator
695. Whose responsibility is it to ensure that adequate security is built once
the applications and systems have been acquired and are ready for use
in the production department?
A. System Owner
B. Process Owner
C. System Administrator
D. User Manager
696. Who is the person responsible for creating new system user accounts
and changing permissions of existing user accounts?
A. User Manager
B. System Administrator
C. Super User
D. Security Manager
697. Who holds the ultimate responsibility for all user id’s and information
assets owned by the company’s employees?
A. Super User
B. Security Manager
C. Steering Committee
D. User Manager
698. Who is responsible for defining security strategy and policies for an
organisation?
A. Steering Committee
B. Information Owner
C. Security Manager
D. Information Custodian
699. What is the role of Human Resources Security when the employment of
a person is terminated?
A. Ensure that access to sensitive data is revoked immediately
B. Define appropriate access to sensitive information for another person
C. Send regular updates in an effort to safeguard the data which was in
their possession
D. Educate the terminated employee to prevent data disclosure to 3rd
parties
700. What is ‘Acknowledge Policy’ with regard to Security Awareness
training program?
A. All employees are required to undergo security awareness training
B. All employees and third parties having access to sensitive information
have to complete training at least once a year
C. All employees are required to acknowledge that they have read and
understood the organization's information security / acceptable use
policy.
D. All employees have to go through a formal induction process
designed to
introduce the organisations security policies
701. What is the primary goal of configuration management?
A. Ensuring that changes to the system do not unintentionally diminish
security
B. Mitigate the impact that a change might have on the security of other
systems
C. Configuring systems to meet the security requirement of the
organisation
D. Updating the software with the latest versions of all applications
702. What is the objective of a non- disclosure agreement?
A. Identify functional and physical characteristics of each configuration
setting
B. Impose limitations on like organisations that operate in the same
competitive space
270
Protection of Information Assets
272
Protection of Information Assets
A. Abcde
B. Rosy98
C. 31567
D. qqbRqs$W
711. The customer data for the loyalty card issued by a retail store is picked
from a form filled by the customer. The data from the form is entered
into software by data entry operators who report to a manager. In order
to protect customer data, segregation of duties are built in the software
in such a way that the operators have permission only to enter data.
Any editing or modification can be done only by the manager. It so
happens that the manager quits his employment and the store elevates
the position of one of the operators to that of a manager. Who do you
think is responsible for removing the permission of the exiting manager
and changing that of the new manager?
A. Information Owner
B. New Manager
C. System Administrator
D. Information Owner
712. The retail store (mentioned in question 3) has branches in locations
across India and the same process for collecting customer data for
loyalty programs is followed in all the branches. This data is then
consolidated into one database and is accessible across all branches.
The persons who are assigned responsibilities with respect to this
database are as follows:
• Management as Information Owners
• General Manager – Marketing: As custodian for the data
• General Manager – Operations: as owner of the process
• System Administrator
• Branch Manager
• Data Entry Operator
Who, do you think, is responsible for processing the information that
is received from the branches, checking it and circulating it?
A. Management
B. General Manager, Marketing
C. General Manager, Operations
D. Branch Manager
713. In the same case as mentioned in Questions 3 and 4, who, do you think
is responsible for ensuring that the customer data is secure and
running regular back ups?
A. General Manager, Marketing
B. General Manager, Operations
C. Data Entry Operator
D. D. System Administrator
714. You are an Information Systems Security Awareness Training Manager
employed in a Multinational Bank. You have been part of a team that
has created a security training program including classroom, online
and web based trainings which is mandatory for all employees and third
parties who have access to the bank’s sensitive information. How
would you ensure that employees and third parties are continually
updated on latest issues?
A. By introducing them to the bank’s expectations with respect to
Information Security
B. By making Security Awareness training mandatory for the
management
C. By getting a written acknowledgement from employees that they have
read and understood the policy
D. By giving security awareness training to employees and third parties
at least once a year
715. A bank has outsourced certain processes related to its personal loans
unit to a third party vendor. As an IS auditor of the bank, what would
you look for to assure yourself that non- public business information
accessed by the third party vendor is protected and not misused?
A. A non -disclosure agreement signed by the vendor
B. Check if all employees of the vendor are given enough training
C. Verify if there are instances of data being misused earlier
274
Protection of Information Assets
D. Check for a written acknowledgement from the vendor that they have
read and understood the company’s policy
716. Organisations have to identify the information that needs various levels
of protection and put them in the appropriate ‘bucket’. Why can’t the
entire information within an organisation be protected uniformly?
A. There is a great dependence on information by organizations
B. It provides a systematic approach to protecting information
consistently
C. Maintaining security in a network environment is complex
D. It will be a massive task to protect all information uniformly
717. How must an organisation ensure that its information is adequately
protected,
i.e., neither over protected nor under protected.
A. By training its employees who are using the information
B. By ensuring that its information is not shared in any network
C. By classifying its information and placing it in the appropriate bucket
D. By not sharing information with third parties
718. Information classification ensures that security controls are only
applied to information that requires such protection. What is the benefit
of such an exercise?
A. Reduces operational costs of protecting information
B. Helps the management access sensitive information
C. Ensures that such information is not shared with third parties
D. Ensures that such information is not accessible to employees
719. How does an organisation ensure that appropriate users gain access to
appropriate files?
A. By classifying users to groups
B. By classifying and labeling information
C. By not sharing information in the general network
D. By having a supervisor for groups who controls access
720. What are the factors to be considered for determining the level of
confidentiality of information?
A. Relevancy to a business transaction
B. Meeting particular compliance requirements
C. Changes to the content and external conditions of information
D. Appropriate User groups
721. An Information classification policy determines the accountability of
Information Owners, custodians and users. Who is responsible for
assigning classifications to information assets?
A. System Owner
B. Information Owner
C. System administrator
D. Process Owner
722. Under what information category does widely distributed product
brochures fall?
A. Sensitive Information
B. Client Confidential Information
C. Unclassified/Public Information
D. Company Confidential Information
723. Under what category does Company developed software
codes fall?
A. Sensitive Information
B. Client Confidential Information
C. Company Confidential Information
D. Unclassified/Public Information
724. Under what category does information received from clients fall?
A. Client Confidential Information
B. Company Confidential information
C. Unclassified/Public Information
276
Protection of Information Assets
D. Sensitive Information
725. What is Personally Identifiable Information (PII)?
A. Personal Information of any person who needs to provide this to
the organisation
B. Information held by an organisation which can identify a
stakeholder
C. Personal Information pertaining to the employees of an organisation
D. Personal Information pertaining to the third parties associated with the
organisation
726. What is the standard that must be complied with by all those deals with
credit/debit cards?
A. PCIDSS
B. Electronic Communications Privacy Act
C. Information Technology Acct 2000
D. Regulations mandated by Reserve Bank
727. What is the Act which mandates how financial institutions must deal
with the private information of individuals?
A. Information technology Act 2000
B. Video Privacy Protection Act
C. Gramm-Leach-Bliley Act
D. Electronic Communications Privacy Act
728. Which of the following does not classify under Personally identifiable
Information?
A. Company advertisement information
B. Medical information of patients
C. Location information of clients
D. Information collected by websites
729. How is information classification applied for information contained in a
critical database?
A. at the file or data level
B. to the entire database
C. to each individual document
D. at column level at the discretion of the information owner
730. How can critical data be protected during transmission, processing and
storing?
A. By keeping the information physically secured
B. By encrypting
C. By controlling access
D. By taking a backup
731. What are the solutions referred to under DLP (Data Leak Prevention)?
A. Protecting data based on the rule set and classification
B. Expecting creator of data file to choose who shall access data
C. Authenticating users out of the organisation
D. Working at data base level and managing the access rights
732. What is the pre requisite for successful implementation of data
protection tools like DLP, DRM and DAM?
A. Identifying information resources
B. Creating an information risk profile
C. Creating appropriate rule set and classification based on impact of
risks
D. Establishing a process for data classification
733. Which of the following is a risk associated with Portable Devices?
A. Users can access Company’s internal information from anywhere
B. It is prone to physical security problems because of availability within
the workplace
C. Unauthorised users may access hard copy of electronic data
278
Protection of Information Assets
280
Protection of Information Assets
742. Which of the following is an information asset that need not be included
in physical access control?
A. Information in transit through mail
B. Primary computer facilities
C. Micro computers
D. Printers
743. Which of the following is not a physical access control?
A. Manual doors or cipher KEY locks
B. Protecting data with passwords
C. Controlling the reception area D. Logging in
visitors
744. Threats to Information Assets like computing equipment, media and
people are known as:
A. Cyber threats
B. Environmental Threats
C. Physical Threats
D. Logical Access Threats
745. “Preventing modification of data by unauthorised personnel” falls
under which core principle of Information Safety?
A. Integrity
B. Confidentiality
C. Availability
D. Security
746. Under what category of Physical Security threat does poor handling
and cabling of electronic equipments fall?
A. Electrical
B. Environmental
C. Maintenance
D. Hardware
747. Which of the following is not a source of Physical Security threat?
A. Uncontrolled/Unconditioned Power, Low voltage
B. Physical Access to IS resources by unauthorised personnel
C. Discontented or disgruntled employees
D. Interested or Informed outsiders
748. In an organisation there are instances of employees using the internet
for personal purposes. Under what threat is this classified?
A. Logical access threat
B. Environment threat
C. Improper physical access threat
D. Electrical threat
749. Viewing or copying of sensitive information by visitors who have gained
unauthorised access to the same is:
A. An Improper Physical Access Exposure
B. An Unintentional or Accidental Exposure
C. A Deliberate Exposure
D. An Environmental Exposure
750. If windows exist in a data centre, they must be translucent and
shatterproof. Why?
A. To avoid data leakage through electromagnetic radiation
B. To prevent anyone from peeping and viewing data
C. To avoid environmental threats to physical systems
D. To avoid theft of physical assets
751. Why audit trials and control are logs important for Security
Management?
A. To know where access attempts occurred and who attempted them
B. To reduce unauthorised access to sensitive information
C. To prevent modification or deletion of file content
D. To prevent unintentional physical access
282
Protection of Information Assets
284
Protection of Information Assets
762. A card reader that senses the card in possession of a user in the general
area and enables faster access is:
A. Wireless proximity readers
B. Motion detectors
C. Cable locks
D. Identification Badges
763. Lockable switches that prevent a KEY board from being
used is:
A. Switch controls
B. Biometric Mouse
C. Laptop security
D. Peripheral switch controls
764. A smart card used for access control is also called a security access
card. Which of the following is not a type of smart card?
A. Identification cards
B. Photo Image Cards
C. Digital coded cards
D. Wireless proximity readers
765. Which of the following is not a biometric characteristic?
A. Finger prints
B. Retina scans
C. Passport photo
D. Palm scans
766. Name the performance measure in biometrics which is the percentage
of invalid subjects that are falsely accepted.
A. False Rejection Rate (FRR)
B. False Acceptance Rate (FAR)
C. Crossover Error Rate (CER) D. Throughput rate
767. With respect to biometrics evaluation, how is the time taken to register
with a system referred as?
A. Enrolment time
B. Throughput rate
C. Acceptability
D. Registration time
768. With respect to audit of physical access controls, what does controls
assessment mean?
A. Ensuring that the risk assessment procedure adequately covers
periodic and timely assessment of all assets
B. Evaluating whether physical access controls are in place
C. Examining relevant documentation such as the security policy and
procedures, premises plans, building plans, etc
D. Reviewing physical access controls for their effectiveness.
769. The review of physical access controls by an auditor need not include:
A. Observing safeguards and Physical access procedures
B. Interviewing personnel to get information of procedures
C. Authorising special access
D. Touring organisational facilities
770. What should an auditor check for in case of employee
termination?
A. The employees tenure and his conduct during the same
B. Withdrawal and deactivation of access rights
C. Whether appropriate rights have been granted to the replacement
D. Whether there is any due from the employee to the organisation
771. What is the review procedure that should be adopted by an auditor to
ensure that there is adequate security at entrance and exits?
A. Review physical layout diagrams , risk analysis, procedure for
removal and return of storage media, knowledge and awareness of
emergency procedures by employees
286
Protection of Information Assets
288
Protection of Information Assets
290
Protection of Information Assets
292
Protection of Information Assets
D. System Administrator
799. On what basis are access privileges assigned to a user?
A. Seniority level
B. Expertise and qualification
C. Job requirements and responsibilities
D. There is no basis. It is randomly assigned
800. In password management, how can misuse of passwords by system
administrators be prevented?
A. Force change on first login by the user
B. Secure communication of password to user
C. By generating hash while storing
D. By taking an undertaking from the system administrator
294
Protection of Information Assets
296
Protection of Information Assets
298
Protection of Information Assets
300
Protection of Information Assets
837. This is a multi- level secure access control which defines a hierarchy
of levels of security.
A. Discretionary Access Control
B. Mandatory Access Control
C. Role Based Access Control
D. Database Access Control
838. Which of the following is a feature of Role Based Access Control?
A. Multilevel secure access control mechanism
B. The Matrix defines the whole state of the system
C. Systems are centrally administered and are nondiscretionary
D. Access control lists are used to store the rights with object
839. Access to database can be controlled through permission settings. On
what basis is this permission system designed?
A. Principle of least privileges
B. Permissible values or limits
C. Approval by data owner
D. Access levels
840. What permissions does a user with ‘Manage’ access level have with
regard to a database?
A. View, Edit, Add and delete
B. View, add, edit and delete (only information added by them)
C. View, Edit, Add, Delete and change database design
D. Only view
841. When access to database is controlled through application software,
how is maintenance of database done?
A. Users are granted access for maintenance
B. Direct access is granted to DBA
C. Direct access is granted to system administrator
D. User managers are granted access
842. What is user access to applications with respect to their job
responsibilities or logical access control called?
A. User Password Management
B. Equipment Management
C. Privilege Management
D. Network Management
843. Which of the following operating system access control ensures a
particular session is initiated from a particular location or computer
terminal?
A. Automated Terminal Identification
B. Terminal Log On Procedures
C. Password Management Stem D. User identification and
Authentication
302
Protection of Information Assets
B. Password
C. Biometric comparison
D. Personal Identification Number (PIN)
847. Which of the following is the weakness of the password logon
mechanism?
A. Periodic changing of password
B. Encrypted password
C. Repeated use of the same password
D. One user one password
848. _________________ is defined as automated mechanism, which uses
physiological and behavioral characteristics to determine or verify
identities.
A. Biometrics
B. Plastic cards
C. Logon/password systems
D. Smart Cards
849. What is/are the error(s) caused by biometrics due to the complexity of
data?
A. False Rejection Rate (FRR)
B. False Acceptance Rate (FAR)
C. Crossover Error Rate (CER)
D. FRR and FAR
850. Facial scan, iris and retina scanning are used in _______________.
A. Biometric security
B. Smart tokens
C. Bio direct security
D. Backup security
851. Which of the following provides system administrators the ability to
incorporate multiple authentication mechanisms into an existing
system using pluggable modules?
A. Personal Authentication Module
B. Password Processing Module
C. Pluggable Authentication Module
D. Login identification Module
852. Access privileges of a user for two entities, A and B for read and write
are maintained in the _____________ within an application.
A. Actual access control list
B. Access control list
C. Acquired control entry
D. Secret policy entry
853. The characteristic of network that improves reliability and performance
due to dynamic routings between two end points is better known as:
A. Anonymity
B. Automation
C. Routing diversity
D. Opaqueness
854. Network establishes communication among disperse users/machines.
Which of the following is a disadvantage of this characteristic of
networks?
A. Risks like impersonation, intrusion, tapping
B. Very fast communication speed
C. Physically far end points
D. Humans cannot tell the location of the remote site
855. What is the program that an attacker uses which reports to him which
ports responds to messages and the vulnerabilities present in each
port?
A. Social Engineering
B. Dumpster diving
304
Protection of Information Assets
C. Port Scan
D. Malware
856. What does Social Engineering involve?
A. Gathering bits of on formation from various sources
B. Using social skills to persuade a victim
C. Looking through items that have been discarded
D. Eavesdropping
857. ‘Dumpster Diving’ is a commonly used ________________ technique.
A. Reconnaissance
B. Social Engineering
C. Documentation
D. Application fingerprint
858. The process by which an attacker comes to know about the commercial
server on which an application is running, the version and operating
system for the same is known as:
A. Biometrics
B. Protocol flaws
C. Wiretapping
D. OS and Application Fingerprinting
859. How does an attacker use Malware to gather information?
A. Investigate a product that can be the target of an attack
B. Search for additional information on systems, applications or
sites
C. Scavenge the system and receive information over network
D. Post latest exploits and techniques
860. The process by which an attacker picks off the content of a
communication passing in an unencrypted form is known as:
A. Eavesdropping B. Wiretapping
C. Microwave signal tapping
D. Satellite signal interception
861. What is active wiretapping?
A. Listening to communications intentionally
B. Overhearing without extra effort
C. Injecting something into the communication stream
D. Placing an illegitimate antenna to intercept communication
862. The costs of intercepting satellite communications are very high
because:
A. All traffics passing through a node have to be monitored
B. Neither the sender nor receiver should know that contents have been
intercepted
C. Satellite communications are heavily multiplexed
D. Cost of placing an illegitimate antenna is more
863. A wireless signal can be picked up easily within 60
meters. Why?
A. The signal is strong up to 60 meters
B. The signal is weak up to 60 meters
C. There is no signal up to 60 meters
D. The signal is strong after 60 meters
864. It is not possible to tap an optical system without detection. Why?
A. Optical fiber carries electricity but does not emanate a magnetic field
B. Optical fiber carries light energy which does not emanate a magnetic
field
C. An optical signal is not very strong and hence cannot be picked up
D. An antenna needs to be placed to intercept which is detectible
865. A term used for a virtual network of zombies used to launch attack on a
system is:
A. BOTnets
B. Spam
306
Protection of Information Assets
C. Malware
D. Spoofing
866. An employee who is on leave reveals his authentication details to
another in order to allow access to carry out urgent activities in his
absence. It so happens that these details are passed on without
encryption. How is the employee making his authentication information
vulnerable to an impersonator?
A. The impersonator can guess the identity by using common passwords
B. The impersonator can exploit flaws and weaknesses of the operating
system
C. The attacker can circumvent or disable the authentication mechanism
D. These details can be rescued by an impersonator by eavesdropping
or
wiretapping
867. An organisation purchases 10 new systems which are installed by the
seller using a test account without any password. However,
authentications are put in place and users access information after
proper authentication. But the test account has not been deleted. How
can an impersonator foil authentication in this case?
A. Information can be accessed through session hijacking
B. Information can be hijacked by intruding between two authenticated
users
C. Information becomes vulnerable through well- known test password
D. Information can be accessed through spoofing or masquerading
868. Not only is the message itself sensitive but the fact that a message
exists is also sensitive. How can an attacker infer that sensitive
messages exist between two confidential parties?
A. Traffic flow analysis
B. Using exposures as part of attack
C. By modifying a destination address
D. Taking advantage of mis-delivery due to congestion at network
elements
869. Which of the following amounts to compromising the integrity of
messages?
A. Mistyping an address so that it reaches the wrong recipient
B. Mis-delivery of messages due to some flaw in the network hardware
or software
C. Exposure of messages in temporary buffers
D. Combining pieces of different messages into one false message
870. It is easy for an attacker to obtain information necessary to attack the
website. How?
A. Website codes are downloaded and executed in the browser from
which the information can be obtained
B. The attacker exploits vulnerabilities in multiple machines and uses
them to attack the target simultaneously.
C. An attacker can monitor the communication between a browser and a
server to see how changing a web page entry affects what the
browser sends and reacts.
D. attackers execute scripts in the victim’s browser which can hijack user
sessions
871. What is ‘Ping of Death’?
A. Sending more data that what a communication system can handle,
thereby
preventing receipt of legitimate data
B. Crashing a large number of systems by sending a ping of certain size
from a remote machine
C. Corrupting the routing so that traffic can disappear
D. corrupting a name server or causing it to cache spurious entries,
thereby redirect the routing of any traffic
872. What are the multiple machines that are used by an attacker for DdS
attacks called?
A. Cookies
B. Routers
C. Zombies
308
Protection of Information Assets
D. FTP
873. A code which can cause serious damage to a system because it is not
screened for safety when it is downloaded and runs with the privileges
of its invoking user is called:
A. Hostile applet code
B. Cookies
C. Scripts
D. Active X
874. A virus that is difficult to detect because it modifies itself and changes
its identity thus hiding itself from antivirus software:
A. MBR Virus
B. Stealth Virus
C. Polymorhic virus
D. Macro Virus
875. What is a Trojan Horse?
A. Virus that affects the boot sector of storage device
B. Virus that affects applications like Microsoft Word and Excel
C. Stand- alone viruses that are transmitted independently
D. Malicious codes hidden under a legitimate program
876. Malicious codes added to an existing application to be executed at a
later date is known as:
A. Logic bomb
B. Trojan Horse
C. Polymorphic virus
D. Stealth virus
877. What is the method used by most of the antivirus software to identify
virus infections in a system? A. Monitoring traffic
B. Signature detection
C. Repair or quarantine
D. Scan processes
878. When do injection flaws occur?
A. When untrusted data is sent to an interpreter as part of a command or
query
B. When application functions related to authentication and session
management are not implemented correctly
C. When an application takes untrusted data and sends it to a web
browser without proper validation
D. When a developer exposes a reference to an internal implementation
object
879. What is a Cross Site Request Forgery Attack?
A. It forces a logged on victim’s browser to send a forged HTTP request
B. It forges request in order to access functionality without proper
authorisation
C. It helps steal or modify weakly protected data
D. It facilitates serious loss or data takeover
880. In case of advanced persistent threat why is an antivirus unable to
detect the malware?
A. The attack is on an identified subject
B. Social engineering methods are used
C. Malware is specifically written for this purpose
D. The attack continues for a longer duration
881. In order to limit the amount of damage a single vulnerability can allow,
it is important to:
A. All servers reside on a single segment
B. There should be different segments for different servers
C. Having a single web server
D. Eliminating single points of failure
882. Where does encryption occur when data is encrypted in link encryption?
A. Data link layer of the receiving host
310
Protection of Information Assets
B. Network layer
C. Data link layer in the OSI model
D. In transit between two computers